ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Operationalize Security to Patch Vulnerabilities

    Sponsored by: BMC

    This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.

  • Here's What Your Personal Data is Going for on the Dark Web

    Sponsored by: BMC

    How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.

  • Enabling The Industrial Internet Through Software Assurance

    Sponsored by: Synopsys

    Access this white paper to better understand the far reaching effects vulnerable industrial technologies could have on the world. Learn from organizations who have dealt with crippling cyber attacks and discover how to instill confidence in your devices' security moving forward.

  • Best Practices for Social Media Archiving and Security

    Sponsored by: Proofpoint, Inc.

    While social media can provide a number of important benefits to organizations, increasing use of social media comes with several security/compliance risks and costs. Uncover social media usage statistics, risk possibilities and how to best employ social media securely for your organization.

  • IDC: Rethinking the Network as a Security Sensor and Enforcer

    Sponsored by: Cisco Systems, Inc.

    Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.

  • NGFW Requirements for SMBs and Distributed Enterprises

    Sponsored by: Cisco Systems, Inc.

    Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.

  • Six Steps to a More Secure Business: Mitigating the Threats to Your Data

    Sponsored by: NTT ICT

    Discover how to mitigate the risks posed by data breaches, compliance violations, reputational damage, and business downtime, backing up your critical data as new technologies introduce unpredictable risk into the enterprise. Access the outlined 6 steps to implement better data protection.

  • Simplifying Security Engineering With Effective Network Segmentation

    Sponsored by: Cisco Systems, Inc.

    Forrester Consulting conducted a Total Economic Impact (TEI) study and examined the potential return on investment enterprises may realize by deploying Cisco TrustSec. Access this report to explore and evaluate the potential financial impact of Cisco TrustSec on your organization.

  • The ROI of Enterprise-Wide E-Discovery: How To Save 5 Million Dollars

    Sponsored by: Proofpoint, Inc.

    Access this resource to learn how to maximize your e-discovery ROI. You will learn the difference between collection and review savings. See how your organization can get an ROI of close to 5 million dollars annually.

  • Case Study: Office 365 Enterprise Strengths

    Sponsored by: Proofpoint, Inc.

    Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.

  • Is Microsoft Office 365 Secure?

    Sponsored by: Proofpoint, Inc.

    How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.

  • Five Ways to Protect Your Digital Assets

    Sponsored by: NTT ICT

    Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.

  • The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond

    Sponsored by: Lookout

    Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: SearchSecurity.com

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • 2016 Cost of Data Breach Study: Global Analysis

    Sponsored by: IBM

    This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.

  • Communications as a Service: Improving Response Time and Resiliency During Critical Events

    Sponsored by: IBM

    Safeguard your organization during downtime by leveraging cloud-enabled crisis and incident management. Read on to improve operational processes during unplanned critical events with a service that will boost response effectiveness via real-time situational awareness, demonstrate regulatory compliance, and more.

  • DR Tabletop Testing Simulator

    Sponsored by: Databarracks

    Explore three disaster scenarios and answer the provided questions to reveal the appropriate recovery steps for each situation.

  • Information Security Consulting Services Report

    Sponsored by: IBM

    This Forrester report evaluates the 13 most significant information security consulting service providers against a set of 31 criteria. Uncover how well these consultancies fulfill the criteria and where they stand in relation to each other.

  • Cybersecurity Perspectives from the Boardroom and C-suite

    Sponsored by: IBM

    Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.

  • Risk Register and Matrix

    Sponsored by: Databarracks

    Gain access to a Risk Register and Matrix, which allows you to choose specific threats your organization faces and visualize them according to their likelihood of happening and the severity of their potential impact to find out the influence they have on your organization.

  • The Case for Security Intelligence Services, Hosted from the Cloud

    Sponsored by: IBM

    Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.

  • 2016 Cyber Security Intelligence Index

    Sponsored by: IBM

    This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.

  • Trends in SAP Cybersecurity

    Sponsored by: IBM

    The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.

  • Your Guide for Identity Governance and Administration

    Sponsored by: IBM

    With the identity governance and administration (IGA) market maturing, many enterprises are beginning their search for an IAM vendor or reevaluating their current partnerships. This Gartner Magic Quadrant report shows you how various IAM vendors stack up against each other so you can choose the IGA that's right for your organization.

  • For Better Access Governance, Look Beyond Roles to

    Sponsored by: IBM

    Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.